Now showing items 1-10 of 821
An extensible probe architecture for network protocol performance measurement
(John Wiley & Sons, Ltd., 2004-01)
This paper describes the architecture, implementation, and application of Windmill, a passive network protocol performance measurement tool. Windmill enables experimenters to measure a broad range of protocol performance ...
Scalable Linux Scheduling
(Center for Information Technology Integration, 2001-05-01)
For most of its existence, Linux has been used primarily as a personal desktop operating system. Yet, in recent times, its use as a cost-efficient alternative to commercial operating systems for network servers, distributed ...
Response to editorial by Bryan and Rafferty
(Wiley Subscription Services, Inc., A Wiley Company, 2006)
No abstract.
Model refactoring by example: A multi‐objective search based software engineering approach
(Addison‐WesleyWiley Periodicals, Inc., 2018-04)
Declarative rules are frequently used in model refactoring in order to detect refactoring opportunities and to apply the appropriate ones. However, a large number of rules is required to obtain a complete specification of ...
Extending NFSv4 for Petascale Data Management
(Center for Information Technology Integration, 2006-05-01)
Designed with Internet data management in mind, NFSv4 is meeting the needs of widely distributed collaborations. Anticipating terascale and petascale HPC demands, NFSv4 architects are designing pNFS, a standard extension ...
Holistic System Design for Deterministic Replay.
(2013)
Deterministic replay systems record and reproduce the execution of a hardware or software system. While it is well known how to replay uniprocessor systems, it is much harder to provide deterministic replay of shared memory ...
Security Hazards when Law is Code.
(2016)
As software continues to eat the world, there is an increasing pressure to
automate every aspect of society, from self-driving cars, to algorithmic trading
on the stock market. As this pressure manifests into software ...
Introduction: Special Issue on Expanded Papers from the First Workshop on Multimedia Semantics, November 28/29, 2002 in Milovy, Czech Republic, in Conjunction with SOFSEM 2002
(Kluwer Academic Publishers; Springer Science+Business Media, 2004-11)
Predicting the Expected Behavior of Agents that Learn About Agents: The CLRI Framework
(Kluwer Academic Publishers; Springer Science+Business Media, 2003-01)
We describe a framework and equations used to model and predict the behavior of multi-agent systems (MASs) with learning agents. A difference equation is used for calculating the progression of an agent's error in its ...
Secure Coprocessor Integration with Kerberos V5
(Center for Information Technology Integration, 2000-03-22)
The nightmare of Trusted Third Party (t3P) based protocol users is compromise of the T3P. Because the compromised T3P can read and modify any user information, the entire user group becomes vulnerable to secret revelation ...